Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parser exception.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/sinatra/sinatra/issues/1428 | third party advisory exploit |
https://access.redhat.com/errata/RHSA-2019:0315 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2019:0212 | third party advisory vendor advisory |
https://github.com/sinatra/sinatra/commit/12786867d6faaceaec62c7c2cb5b0e2dc074d71a | third party advisory patch |